Rafael Pass Based on [P-Seeman-Shelat] and [P-Shi] Traditional - - PowerPoint PPT Presentation

rafael pass
SMART_READER_LITE
LIVE PREVIEW

Rafael Pass Based on [P-Seeman-Shelat] and [P-Shi] Traditional - - PowerPoint PPT Presentation

Analysis and Design of Blockchains Rafael Pass Rafael Pass Based on [P-Seeman-Shelat] and [P-Shi] Traditional distributed systems: The Permissioned Model Consistency Liveness Paxos/PBFT Traditional distributed systems: The


slide-1
SLIDE 1

Rafael Pass

Analysis and Design of Blockchains

Rafael Pass

Based on [P-Seeman-Shelat] and [P-Shi]

slide-2
SLIDE 2

Traditional distributed systems:

The “Permissioned” Model

Paxos/PBFT

  • Consistency
  • Liveness
slide-3
SLIDE 3

Traditional distributed systems:

The “Permissioned” Model

Paxos/PBFT

  • Nodes a-priori known and authenticated
  • 30 years of distributed systems
  • Multi-party computation [GMW,BGW, ...]

○ Nearly all works assume authenticated channels

slide-4
SLIDE 4

The “Permissionless” Model: Bitcoin/Blockchain

The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.

slide-5
SLIDE 5

The “Permissionless” Model

The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.

  • Nodes do not know each other a-priori
  • Nodes come and go
  • ANYONE can join
  • No network synchronization

Relatively little is known about this model

slide-6
SLIDE 6
  • Strong impossibility results known in the “permissionless”

(“unauthenticated”) model [BCLPR05] ○ Consistency is impossible ○ Sybil attacks unavoidable.

■ [BCLPR05] defined “weakened” security model (w/o consistency)

The “Permissionless” Model

slide-7
SLIDE 7

Nakamoto’s Blockchain [Nak’08]

Prevents Sybil attacks with Proofs-of-Work Puzzles [DN’92] Claims blockchain achieves “public ledger” assuming “honest majority”:

  • Consistency:

everyone sees the same history

  • Liveness:

everyone can add new transactions

slide-8
SLIDE 8

Nakamoto’s Blockchain [Nak’08]

Prevents Sybil attacks with Proofs-of-Work Puzzles [DN’92] Claims blockchain achieves “public ledger” assuming “honest majority”

  • Consistency: everyone sees the same history
  • Liveness: everyone can add new transactions

2 amazing aspects:

  • Overcomes permissionless barrier [BCLPR]
  • Overcomes ⅓ barrier even in permissioned setting[

2 amazing aspects:

  • Overcomes permissionless barrier [BCLPR’05]
  • Overcomes ⅓ barrier even in permissioned

setting [LSP’83]

slide-9
SLIDE 9

Everyone wants a “blockchain”

9

slide-10
SLIDE 10
  • WHAT IS a blockchain?

○ no definition of an “abstract blockchain”

  • Does Nakamoto’s protocol achieve CONSISTENCY?

○ “Specific attacks” don’t work [N’08,GKL’15, SZ’15] ○ 49.1% attack (with 10s network delays) claimed [DW’14]

  • Is Nakamoto’s consensus OPTIMAL?

○ Several issues known (load,latency,incentives)

Nakamoto’s Blockchain: OPEN PROBLEMS

slide-11
SLIDE 11

This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

slide-12
SLIDE 12

This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

slide-13
SLIDE 13

What is a blockchain?

slide-14
SLIDE 14

Idea: Use Proof-of-Work Puzzles to defend against sybil attacks

Users have to do work to cast votes.

slide-15
SLIDE 15

How to build a “blockchain”

slide-16
SLIDE 16

How to build a “blockchain”

elaine ➔ mariana: Ƀ50

slide-17
SLIDE 17

How to build a “blockchain”

“Hash function”

H ( , , )

D >

slide-18
SLIDE 18

Search for a puzzle solution

puzzle solution

( , , ) D >

Difficulty

H

slide-19
SLIDE 19

Search for a puzzle solution

puzzle solution

( , , ) D >

Difficulty

H

slide-20
SLIDE 20

We found a new block

( , , ) D > H

slide-21
SLIDE 21

Best way to find a solution is brute- force search: model H as RO

( , , ) D > H

slide-22
SLIDE 22

What if you join network and you see this.

slide-23
SLIDE 23

Honest nodes only “believe” longest chain

slide-24
SLIDE 24

Elaine → Mariana

Elaine wants to erase this transaction

slide-25
SLIDE 25

Elaine → Mariana

For Elaine to erase his transaction, he has to find a longer chain!

slide-26
SLIDE 26

Elaine → Mariana

“If transaction is sufficiently deep, he cannot do this unless he has majority hashpower”

  • [Nak’08]: “simply trying to mine alternative chain fails”
  • [GLK’15]: in synchronous network
  • [SZ’15]: “non-withholding attacks” fail also with Delta-delay

networks

slide-27
SLIDE 27

“If transaction is sufficiently deep, he cannot do this unless he has majority hashpower”

  • [Nak’08]: “simply trying to mine alternative chain fails”
  • [GLK’15]: in synchronous network
  • [SZ’15]: “non-withholding attacks” fail also with Δ-delays

Elaine → Mariana

slide-28
SLIDE 28

Blockchain abstraction

Consistency: Honest nodes agree on all but last k blocks

w/ prob exp(-k)

≤ k unstable ≤ k unstable

slide-29
SLIDE 29

Blockchain abstraction

Consistency: Honest nodes agree on all but last k blocks

w/ prob exp(-k)

≤ k unstable ≤ k unstable

Future-self consistency

slide-30
SLIDE 30

Blockchain abstraction

Consistency: Honest nodes agree on all but last k blocks

w/ prob exp(-k)

≤ k unstable ≤ k unstable

slide-31
SLIDE 31

Blockchain abstraction

Consistency: Honest nodes agree on all but last k blocks

w/ prob exp(-k)

Chain quality: Any consecutive k blocks contain “sufficiently many” honest blocks

k

slide-32
SLIDE 32

Blockchain abstraction

Consistency: Honest nodes agree on all but last k blocks

w/ prob exp(-k)

Chain quality: Any consecutive k blocks contain “sufficiently many” honest blocks Chain growth: Chain grows at a steady rate

slide-33
SLIDE 33

Blockchain implies “state machine replication” in the permissionless model

Consistency Chain quality Chain growth

Traditional

“state machine replication”

Consistency Liveness

slide-34
SLIDE 34

This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

slide-35
SLIDE 35

Theorem [P-Seeman-Shelat]:

For every ρ<1/2, if “mining difficulty” is appropriately set (as a function of the network delay Δ, and total mining power), Nakamoto’s blockchain guarantees:

  • Consistency
  • Chain quality: 1 - ρ/(1-ρ)
  • Chain growth: O(1/Δ)

where ρ adv’s fraction of hashpower, and adv controls the network

slide-36
SLIDE 36

Theorem [P-Seeman-Shelat]:

For every ρ<1/3, if “mining difficulty” is appropriately set (as a function of the network delay Δ, and total mining power), Nakamoto’s blockchain guarantees:

  • Consistency
  • Chain quality: 1 - (1/3)/(2/3) = 1/2
  • Chain growth: O(1/Δ)

where ρ adv’s fraction of hashpower, and adv controls the network

slide-37
SLIDE 37

Theorem [P-Seeman-Shelat]:

For every ρ<1/2, if “mining difficulty” is appropriately set (as a function of the network delay Δ, and total mining power), Nakamoto’s blockchain guarantees:

  • Consistency
  • Chain quality: 1 - ρ/(1-ρ)
  • Chain growth: O(1/Δ)

where ρ adv’s fraction of hashpower, and adv controls the network

slide-38
SLIDE 38

Theorem [P-Seeman-Shelat]:

For every ρ<1/2, if “mining difficulty” is appropriately set (as a function of the network delay Δ, and total mining power), Nakamoto’s blockchain guarantees:

  • Consistency
  • Chain quality: 1 - ρ/(1-ρ)
  • Chain growth: O(1/Δ)

where ρ adv’s fraction of hashpower, and adv controls the network “Blocks are found SLOWER than Δ”

slide-39
SLIDE 39

Theorem [P-Seeman-Shelat]:

For every ρ<1/2, if “mining difficulty” is appropriately set (as a function of the network delay Δ, and total mining power), Nakamoto’s blockchain guarantees:

  • Consistency
  • Chain quality: 1 - ρ/(1-ρ)
  • Chain growth: O(1/Δ)

where ρ adv’s fraction of hashpower, and adv controls the network “Blocktime” >> Δ

slide-40
SLIDE 40

When c = 60 (10 min blocktime, 10s network delays) Secure: ρ < 49.57 (contradicts [DW’14]’attack!) Attack: ρ > 49.79

“Appropriately set”

slide-41
SLIDE 41

“Appropriately set”

Mining rate of honest players Mining rate

  • f Adv

Network Delay

slide-42
SLIDE 42

Theorem [Security of Nakamoto]

For every ρ<1/2, if mining difficulty is appropriately set (as a function of the network delay, and total mining power), Nakamoto’s blockchain guarantees a) consistency, b) chain quality 1 - ρ/(1-ρ), and c) Chain growth: O(1/Δ)

Theorem [Blatant attack]:

For every ρ>0, for every mining difficulty, there exists a network delay such that Nakamoto’s blockchain is inconsistent and has 0 chain quality

slide-43
SLIDE 43

This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

slide-44
SLIDE 44

Terrible performance Not incentive compatible

Nakamoto: ISSUES

slide-45
SLIDE 45
  • Cost per confirmed transaction in Bitcoin: $6.20
  • 7 tx/sec, 10 min TX confirmation time

c.f. Visa credit card: average 2,000 tx/sec, peak 59,000 tx/sec

[Source: K. Croman et al. On Scaling Decentralized Blockchains. In Bitcoin workshop, 2016.]

Bitcoin has terrible performance

slide-46
SLIDE 46

Traditional BFT protocols are performant

PBFT at ~100 nodes: Throughput: ~10,000 tx/sec Confirmation time: ~ seconds

[Source: K. Croman et al. On Scaling Decentralized Blockchains. In Bitcoin workshop, 2016.]

slide-47
SLIDE 47

Hybrid consensus [P-Shi]

Snailchain TXs BFT committee

slide-48
SLIDE 48

Hybrid Consensus: The idea

k unstable k

slide-49
SLIDE 49

PBFT

Hybrid Consensus: The idea

k unstable k

slide-50
SLIDE 50

PBFT

Hybrid Consensus: The idea

k unstable k

slide-51
SLIDE 51

k unstable k: PBFT

Committee members sign each (seq #, tx) Non-members count ⅓k

Chain quality: ⅔ committee honest (if ¾ honest overall) Chain growth: this won’t take too long Consistency: everyone agrees on committee

Hybrid Consensus: The idea

slide-52
SLIDE 52

k unstable k: PBFT

  • Committee members sign each confirmed

(seq #, tx)

  • Non-members count ⅓k + 1 sigs

Achieves static security Not adaptively secure

  • Can deal with it using rotating committees

Hybrid Consensus: The idea

slide-53
SLIDE 53

Summary

  • Nakamoto’s protocol achieves strong robustness properties,

assuming “honest majority of computational power”

➔ Assuming puzzle difficulty is appropriately set as a function of network delay Δ ➔ Blocktime need to be rougly 10 * Δ for to handle ⍴> 0.45 ➔ Leads to high latency (slow confirmation times)

  • Can BOOTSTRAP Nakamoto into new blockchain protocols

➔ Low latency (fast confirmation times) ➔ incentive compatible: fruit chains